BetaNews Staff

Forecasting the cloud security landscape in 2020

cloud magnifier

Every year, threat actors will continue to evolve their current tactics, techniques, and procedures (TTPs) that they use in order to exfiltrate customer, company and partner data, interrupt business operations, implant ransomware, and more. In fact, cybercrime damage costs are predicted to hit $6 trillion annually by 2021, according to research from Cybersecurity Ventures. In 2020, as cybercriminals refine their methods, we will continue to see a plethora of breaches occur due to a common vulnerability: misconfigurations.

Despite organizations running an average of 40 percent of their workloads in the public cloud, most companies fail to be able to accurately identify the risk of misconfiguration in public cloud as higher than the risk in traditional IT environments. In the new year we will also see a greater focus placed on identity in cloud security -- a challenge that’s easier said than done, since approaches that worked in traditional data center environments do not translate to the cloud.

Continue reading

No-deal Brexit: Tips for migrating data to preserve the free flow of business

Brexit flags

With Brexit looming large, the only thing that is certain is the uncertainty of Brexit’s impact. A no-deal Brexit conjures visions of trucks and ships backed up at border crossings and ports of entry, slowing commerce to a snail’s pace. But the real business impact of a no-deal Brexit is in the free flow of data between the EU and the U.K., and many small and mid-sized businesses are likely unprepared. It is estimated that 80 percent of Britain’s economy is founded on services, not goods. Between 2005 and 2015, the volume of data entering and leaving the U.K. increased 28 times, and 75 percent of this data was exchanged with EU countries.

In a no-deal Brexit, the U.K. will become a "third country," no longer part of the General Data Protection Regulation (GDPR). Consequently, according to the U.K.’s Information Commissioner’s Office, data from EU countries will likely no longer be able to flow freely into the U.K. without a contract in place between the sender and U.K.-based SMBs that meets EU-approved terms. For those unprepared, the fallout from this could be disastrous. U.K. businesses that manage or store large volumes of data within the EU, such as those in the financial or tech industries, may look to relocate their operations to minimize the risks and impacts for their business. In moving their operations, businesses will need to transfer large volumes of data.

Continue reading

IoT's powerful promises

IoT devices

How big is the Internet of Things (IoT) market? According to a Gartner report, by 2020 connected devices across all technologies will reach 20.6B. The early adopters of this technology can be found in agriculture, utilities, and cities, but the applications are seemingly endless and extend into homes and even wearable devices. In a similar manner that the Internet has changed our lives, so too will its extension into many "things" that connect and extract pertinent data to improve our personal and professional existence.

Interjecting smarts into muted devices will require new methods of connectivity.

Continue reading

Why data stagnation is a threat to digital transformation

digital transformation

Companies are now readily investing in digital transformation to completely digitize their internal operations and get ahead of the competition. But most companies end up focusing too much on the number of applications they are integrating and too little on how those applications are actually helping their employees.

When departments use different applications that don’t integrate well, it can lead to data stagnation and isolation which will threaten your digital transformation initiatives.

Continue reading

Complex transformations need analytics and intelligence

digital transformation

In the public sector IT projects are often struggling. The Infrastructure and Projects Authority annual report (IPA), published in July 2018, assessed 133 large and risky programs the UK government has in flight. Overall, the IPA noted a general increase in the proportion of projects ranked red or amber-red -- which indicates projects are undeliverable or at high risk of failure -- from 38 to 46, and a decline in the proportion given amber-green or green, from 28 to 24. It happens in the commercial markets too, but of course, it doesn’t always make the headlines.

Clients -- commercial or public sector -- need to look for delivery organizations that make greater use of analytics and intelligence if they are to drive the successful completion of complex IT transformations.

Continue reading

The rise of first-party data: Why quality matters over quantity

Digital data

For years, digital marketers have paid hand over fist in the digital gold rush for data. Instead of a tangible product, tech companies earn millions in revenue from the data they collect on previous, current and future digital consumers. But digital marketers seeking to gobble up as much data as they for their campaigns, while not stopping to consider the source of or methods used to collect it, are taking the wrong approach. The age-old mantra of "quality over quantity" has never been more relevant in online advertising, and marketers must quickly and fully embrace first-party data or risk their digital campaigns (and bottom lines) falling flat.

The primary reason to use first-party data over third party data from data marketplace platforms is simple: it’s better. Publishers, apps and ad platforms alike can gather first-party data directly from their audiences and customers, whether that data be purchases, app downloads, in-app actions, social media interactions, or subscriptions. This data comes directly from the source, making it as precise and accurate as possible. This is in stark contrast to third party data, which is aggregated from multiple platforms and combined into a larger data set where buyers generally do not know the exact sources of their data.

Continue reading

How, what, where, when, and why of experimentation

Every new feature starts as an idea. Not all ideas are good ideas. Therefore, not every new feature is a good idea. So how do you know which feature is a good idea and which one isn’t? You experiment.

The idea of experimenting on users or in production may sound scary and complicated, but it doesn’t have to be. The questions below shed some light on common questions surrounding experimentation and can help you determine if experimentation is right for you.

Continue reading

Is dark data valuable?

A tsunami of dark data is coming -- data that has never been analyzed, tagged, classified, organized, evaluated, used to predict future states, control other processes or has been put up for sale for others to use. So, what do we do with this data? First, we have to understand that exponentially more is coming. We see this in autonomous technology as vehicles generate four thousand gigabytes per day.

Also data is becoming more complex, as most of it is already in in video or other complicated forms. Seemingly free storage is encouraging people to store more and defer deletion.

Continue reading

Digital Transformation is the Industrial Revolution of our age

digital transformation

Around the globe, across all industries, every organization intent on surviving the next decade of economic disruption is shifting from analog to digital. Any company serious about advancing its brand, capturing its best customers and expanding its future is in the process of integrating digital technologies that will help them reimagine every aspect of their business.

And most of them are failing. According to a recent McKinsey global survey on Digital Transformation, more than 80 percent of organizations have undertaken such steps in the past five years, but only 16 percent of respondents say their efforts have successfully improved performance, while also equipping them to sustain long-term change. Reported success rates in more traditional industries -- like Automotive and Pharmaceuticals -- are even more dismal (4-11 percent).

Continue reading

An apology letter to IT

Dear IT, we owe you an apology.

To IT teams everywhere, we’re sorry. We’re sorry for the endless To Do list that never seems to go away. In fact, it seems to only get longer, and we know it feels even more impossible to get your head above water every single day. The overwhelming number of security threats. The never-ending Windows updates. Helpdesk requests and self-inflicted errors caused by rogue software that users install without permission. The ridiculous number of mobile devices we’ve introduced into the landscape, which we expect you to protect and maintain. You’re swimming faster and faster, but still drowning in tasks. And, we know that you’re getting tired.

Continue reading

Boosting the sagging morale of enterprise IT team

If you talk with people who work in enterprise IT departments, you are likely to sense the stress radiating from them. Demands placed on team members can be debilitating as they attempt to fortify systems against incessant threats while keeping increasingly complex networks running with speed and efficiency. And the pressure continues to mount. Something needs to change before the culture and integrity of IT departments becomes irreparably damaged.

IT departments make up the central nervous system of an organization. How healthy a company’s infrastructure is reveals a lot about it overall. If systems don’t run accordingly -- from all-out crashes to slow performance to endpoint compliance issues -- companies can’t meet their potential. In today’s fast-paced, ultra-competitive environment, this could prove fatal.

Continue reading

5 ways for healthcare providers to build a fortress against cyber threats

Firewall

The healthcare industry has yet to find a cure for cyberattacks. Housing personal health data, all kinds of providers are vulnerable targets of hackers and patient care can be put at great risk.

News of breaches in healthcare computer systems is a regular occurrence. Over 100,000 medical records were recently leaked as a result of a data breach at a Montana hospital. And research this year showed an upsurge in malware attacks on healthcare providers. Phishing messages, a means of malware delivery via email, have been found to come in the form of alerts from the US Centers for Disease Control and Prevention (CDC).

Continue reading

Are employment matchmaking services the future of finding jobs?

Happy mobile user

As of August 2019, the national unemployment rate for the United States was 3.7 percent according to the Bureau of Labor Statistics. Compare that figure to the jobless rate in 2009 -- about 9.9 percent, in the midst of the Great Recession -- and it’s clear that the economy and job market are both at a strong point. The state of the economy has created a job seeker’s market in which skilled professionals can find a wealth of opportunities and employers must compete for top talent.

The priority for job seekers is finding jobs that suit their talents, offer the kind of working life that they want to have, and pay well. The priority for employers is attracting qualified, talented candidates who will mesh perfectly with their company culture -- something that has felt like a needle in haystack search in certain industries. A growing trend stands to serve both these priorities at the same time: employment matchmaking.

Continue reading

Advanced SystemCare 13 launches with enhanced email protection

There’s an argument against whether your modern PC requires additional optimization. Windows 10 offers basic but essential tools to keep your system running smoothly and it’s less likely you’ll run out of drive space or require a system purge to make room for a new install.

With the above in mind, system maintenance developers are coming up with new ways of making their tools essential in the modern world. Security remains a constant threat, so adding modules to keep your system safe seems to be the recent priority.

Continue reading

Mozilla's new Lockwise app will free your passwords from your web browser

Like many users, we prefer to use Google Chrome or Mozilla Firefox over either Edge or Safari. Problem is, if you use a third-party browser to store your logins and passwords, move to your iOS device and they aren’t stored in your keychain.

Recent iOS changes have enabled third-party password managers to be granted access to any login on your device, so for this reason Mozilla has launched Lockwise which will separate your stored Firefox passwords from your browser.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.